TIP: Click on subject to list as thread! ANSI
echo: aust_avtech
to: David Drummond
from: Bob Lawrence
date: 2004-05-30 13:37:02
subject: Locking Windows

BL> BTW, what's this new Sasser worm that exploits a "flaw" in
BL> WinXP?

DD> An unused port that reponds to inbound traffic and actions it.
DD> Not an issue if one has a firewall betwen one's machine and the
DD> the Internet (or runs an OS without such silly shortcomings).
DD> This is not the first worn to exploit unprotected ports in Xp -
DD> remember the MSBlaster worm?

 Yair... I'm about to set up a Linux server on theold machine (once I
get all the files transferred).

DD>> _IF_ it can connect Bob. Read your Linux security blurb, it
DD>> says to close all ports you're not using. Windows doesn't read
DD>> that blurb, it has ports open and welcoming all over the
DD>> bloody place. 

 I was asking about Windows, not Linux. I am very suspicious of
Microsoft. It's all very well to accuse them of stupidity, but after
30 years I would expect even an idiot to have sorted out the bugs.
What remains, is *intentional* bugs... back doors! Gates is a control
freak. He wants access to every PC on the planet - and not just for
profit. You only have to run through the long list of "undocumented"
features in DOS, to see how he thinks.

 "*Of course* Linux closes the ports. Any sane person writing an O/S
would try to make it invulnerable to all but the user. Unfortunately,
Gates and M$ are not sane.

BL> I *know* how it gets in... how does it get RUN?

DD> It drops executables in the right places and patches the
DD> registy to use them. 

 Aha! That's what I assumed.

 I know Win31 pretty well, and when I first looked at Win98, I could
not believe that Gates had used a registry the way he does.

BL> I remember a few years ago, when Keith ran a fancy new firewall
BL> that monitored all his ports. He said he was getting an average
BL> of two or three attacks every day! And some of them were
BL> persistent.

DD> Many are not "attacks" - merely something "feeling" ports.

 Well... how can you tell which? Keith assumed it was an attack, and
so do I.

BL> The Internet connects you to the entire world, and it is the
BL> height of hubris for you to say that you can beat them all. If
BL> Bill Gates can't beat them...

DD> The firewall people can, Linux can.

 Oh, yair?

DD> It's Bill Gates theory that a computer should be easy to use
DD> (or easy for him to control every PC on Earth - or Splong).
DD> There in lies Bill's problem. 

 I think it goes further with Gates that just wanting to make it
easy. Xwindows (and KDE) makes Linux pretty easy without selling the
farm. I think Gates has *two* philosophies: first that it has to be
easy and reliable if he wants a large market; and next he wants to
*own* that market.

DD>> Do not connect a Windows machine directly to the outside world
DD>> without first installing a firewall package that isn't made by
DD>> Microsoft. 

BL> It's not just Microsoft, David. Any well-known firewall runs
BL> the same sort of risk of penetration - especially if they use
BL> the same Windows O/S. I've seen it happen with Borland and
BL> Norton. They are really just another version of Microsoft.

DD> A firewall is not just a software package running on a WinBox.
DD> I do NOT run any firewall software here on the Windows machines
DD> (nor on the hundreds at work). Do not connect the Windows
DD> machines directly to the outside world.

 I agree. I don't even trust Intel, which is one of the reasons I
use the M$ outsider... AMD.

DD>> Do not run untrusted executables (and trust very few). 

BL> This is the problem - whom do you trust? My answer is no one.

DD> I'm not having any problems here - the Gassons aren't having
DD> problems. Surely we're not the only two housholds in the world
DD> who've got this sussed? 

 It's a question of odds. Every time you run an EXE, you take a risk.
I bought this computer with half-a-dozen driver CDs, most of them
burned in China... so I take a risk. My approach is that once I've got
it loaded, and it's working... I never update. You update daily. What
the *actual* risk is, I don't know, but your exposure is a thousand
times greater than mine.

DD> If you're serious about the Linux box being a router/firewall
DD> only take a look at one of the single diskette router
DD> distributions of it (LRP or Freesco or such). These boot from a
DD> wite protected floppy, load inot a RAM drive and run from
DD> there. If something odd happens, just reboot and it
DD> automatically runs a "clean" copy. 

 I've thought of that, but it's not such a big deal with these fast
CPUs and drives. I can run a backup for the entire drive in 3 minutes.

Regards,
Bob



--- BQWK Alpha 0.5
* Origin: Precision Nonsense, Sydney (3:712/610.12)
SEEN-BY: 633/104 260 262 267 270 285 640/296 305 384 531 954 1042 690/734
SEEN-BY: 712/610 848 774/605 800/221 445
@PATH: 712/610 640/531 954 633/260 267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.